Year |
Citation |
Score |
2015 |
Cuervo E, Wolman A, Cox LP, Lebeck K, Razeen A, Saroiu S, Musuvathi M. Kahawai: High-quality mobile gaming using GPU offload Mobisys 2015 - Proceedings of the 13th Annual International Conference On Mobile Systems, Applications, and Services. 121-135. DOI: 10.1145/2742647.2742657 |
0.608 |
|
2015 |
Saroiu S, Wolman A, Agarwal S. Policy-carrying data: A privacy abstraction for attaching terms of service to mobile data Hotmobile 2015 - 16th International Workshop On Mobile Computing Systems and Applications. 129-134. DOI: 10.1145/2699343.2699357 |
0.582 |
|
2015 |
Colp P, Zhang J, Gleeson J, Suneja S, De Lara E, Raj H, Saroiu S, Wolman A. Protecting data on smartphones and tablets from memory attacks Acm Sigplan Notices. 50: 177-189. DOI: 10.1145/2694344.2694380 |
0.543 |
|
2014 |
Smowton C, Lorch JR, Molnar D, Saroiu S, Wolman A. Zero-effort payments: Design, deployment, and lessons Ubicomp 2014 - Proceedings of the 2014 Acm International Joint Conference On Pervasive and Ubiquitous Computing. 763-774. DOI: 10.1145/2632048.2632067 |
0.56 |
|
2014 |
Cuervo E, Wolman A, Cox L, Saroiu S, Musuvathi M, Razeen A. Demo: Kahawai: High-quality mobile gaming using GPU offload Mobisys 2014 - Proceedings of the 12th Annual International Conference On Mobile Systems, Applications, and Services. 345. DOI: 10.1145/2594368.2601482 |
0.515 |
|
2014 |
Santos N, Raj H, Saroiu S, Wolman A. Using ARM TrustZone to build a Trusted Language Runtime for mobile applications International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 67-80. DOI: 10.1145/2541940.2541949 |
0.585 |
|
2013 |
Raj H, Saroiu S, Wolman A, Padhye J. Splitting the bill for mobile data with SIMlets Acm Hotmobile 2013: the 14th Workshop On Mobile Computing Systems and Applications. DOI: 10.1145/2444776.2444778 |
0.637 |
|
2012 |
Liu H, Saroiu S, Wolman A, Raj H. Software abstractions for trusted sensors Mobisys'12 - Proceedings of the 10th International Conference On Mobile Systems, Applications, and Services. 365-378. DOI: 10.1145/2307636.2307670 |
0.492 |
|
2012 |
Nguyen A, Raj H, Rayanchu S, Saroiu S, Wolman A. Delusional boot: Securing cloud hypervisors without massive re-engineering Eurosys'12 - Proceedings of the Eurosys 2012 Conference. 141-154. DOI: 10.1145/2168836.2168851 |
0.563 |
|
2011 |
Santos N, Raj H, Saroiu S, Wolman A. Trusted Language Runtime (TLR): Enabling trusted applications on smartphones Hotmobile 2011: the 12th Workshop On Mobile Computing Systems and Applications. 21-26. DOI: 10.1145/2184489.2184495 |
0.571 |
|
2010 |
Cuervoy E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahlx P. MAUI: Making smartphones last longer with code offload Mobisys'10 - Proceedings of the 8th International Conference On Mobile Systems, Applications, and Services. 49-62. DOI: 10.1145/1814433.1814441 |
0.562 |
|
2010 |
Saroiu S, Wolman A. I am a sensor, and I approve this message Hotmobile 2010: the 11th Workshop On Mobile Computing Systems and Applications. 37-42. DOI: 10.1145/1734583.1734593 |
0.546 |
|
2009 |
Loo BT, Saroiu S. 5th International workshop on networking meets databases (NetDB 2009) Sigmod Record. 38: 49-50. DOI: 10.1145/1713254.1713259 |
0.398 |
|
2009 |
Tootoonchian A, Saroiu S, Ganjali Y, Wolman A. Lockr: Better privacy for social networks Conext'09 - Proceedings of the 2009 Acm Conference On Emerging Networking Experiments and Technologies. 169-180. DOI: 10.1145/1658939.1658959 |
0.597 |
|
2009 |
Smith TJ, Saroiu S, Wolman A. BlueMonarch: A system for evaluating bluetooth applications in the wild Mobisys'09 - Proceedings of the 7th Acm International Conference On Mobile Systems, Applications, and Services. 41-53. DOI: 10.1145/1555816.1555822 |
0.584 |
|
2009 |
Saroiu S, Wolman A. Enabling new mobile applications with location proofs Proceedings of the 10th Workshop On Mobile Computing Systems and Applications, Hotmobile'09. DOI: 10.1145/1514411.1514414 |
0.564 |
|
2008 |
Saroiu S, Wolman A. SpySaver: Using incentives to address spyware Sigcomm 2008 Conference and the Co-Located Workshops - Proceedings of the 3rd International Workshop On Economics of Networked Systems, Netecon'08. 37-42. DOI: 10.1145/1403027.1403036 |
0.556 |
|
2008 |
Dischinger M, Haeberlen A, Beschastnikh I, Gummadi KP, Saroiu S. Satellitelab: Adding heterogeneity to planetary-scale network testbeds Computer Communication Review. 38: 315-326. DOI: 10.1145/1402946.1402994 |
0.636 |
|
2008 |
Tootoonchiar A, Gollu KK, Saroiu S, Ganjali Y, Wolman A. Lockr: Social access control for web 2.0 Proceedings of the Acm Sigcomm 2008 Conference On Computer Communications -1st Workshop On Online Social Networks, Wosp'08. 43-48. DOI: 10.1145/1397735.1397746 |
0.603 |
|
2008 |
Ronda T, Saroiu S, Wolman A. Itrustpage: A user-assisted anti-phishing tool Eurosys'08 - Proceedings of the Eurosys 2008 Conference. 261-272. DOI: 10.1145/1352592.1352620 |
0.573 |
|
2007 |
Dischinger M, Gummadi KP, Haeberlen A, Saroiu S. Characterizing residential broadband networks Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 43-56. DOI: 10.1145/1298306.1298357 |
0.661 |
|
2007 |
Miklas AG, Gollu KK, Chan KKW, Saroiu S, Gummadi KP, De Lara E. Exploiting social interactions in mobile systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4717: 409-428. |
0.656 |
|
2006 |
Haeberlen A, Dischinger M, Gummadi KP, Saroiu S. Monarch: A tool to emulate transport protocol flowsover the internet at large Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 105-118. DOI: 10.1145/1177080.1177095 |
0.649 |
|
2003 |
Saroiu S, Gummadi KP, Gribble SD. Measuring and analyzing the characteristics of Napster and Gnutella hosts Multimedia Systems. 9: 170-184. DOI: 10.1007/S00530-003-0088-1 |
0.674 |
|
2003 |
Gummadi KP, Dunn RJ, Saroiu S, Gribble SD, Levy HM, Zahorjan J. Measurement, modeling, and analysis of a Peer-to-peer file-sharing workload Operating Systems Review (Acm). 37: 314-329. |
0.667 |
|
2002 |
Baer A, Saroiu S, Koutsky LA. Obtaining sensitive data through the Web: an example of design and methods. Epidemiology (Cambridge, Mass.). 13: 640-5. PMID 12410004 DOI: 10.1097/00001648-200211000-00007 |
0.335 |
|
2002 |
Saroiu S, Gummadi KR, Dunn RJ, Gribble SD, Levy HM. An analysis of internet content delivery systems Operating Systems Review (Acm). 36: 315-327. DOI: 10.1145/844128.844158 |
0.565 |
|
2002 |
Gummadi KP, Saroiu S, Gribble SD. King: Estimating Latency Between Arbitrary Internet end Hosts Proceedings of the 2nd Internet Measurement Workshop (Imw 2002). 5-18. DOI: 10.1145/571697.571700 |
0.644 |
|
2002 |
Saroiu S, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems Proceedings of Spie - the International Society For Optical Engineering. 4673: 156-170. DOI: 10.1117/12.449977 |
0.333 |
|
Show low-probability matches. |